Its intestesting that :fail: does not stop spoofed return mail.
We have 5 domains constantly being targetting with ridiculous return email addresses.
:fail: is set on all 5 domains.
Yet the message is being delivered to the mail queue irregardless of the :fail: setting.
:fail is supposed to stop [email protected] and it does but when it is a spoofed return, :fail: is ignored and the message is sent to the mail queue anyway.
Anyone have any idea why :fail: does not stop these messages?
We have 5 domains constantly being targetting with ridiculous return email addresses.
:fail: is set on all 5 domains.
Yet the message is being delivered to the mail queue irregardless of the :fail: setting.
:fail is supposed to stop [email protected] and it does but when it is a spoofed return, :fail: is ignored and the message is sent to the mail queue anyway.
Anyone have any idea why :fail: does not stop these messages?